Professional Documents
Culture Documents
Chapter 3: Block Ciphers and The Data Encryption Standard
Chapter 3: Block Ciphers and The Data Encryption Standard
1
Block Cipher Principles
2
Claude Shannon and Substitution-Permutation Ciphers
3
Feistel Cipher Structure
4
Feistel Cipher Design Principles
• block size
• increasing block provides more security, but reduces the en/decryption speed
• key size
• larger size Æ greater security, makes exhaustive key searching harder, but
may slow cipher (common 64, 128)
• number of rounds
• More rounds Æ more security. (Typical 16 rounds)
• subkey generation
• greater complexity makes cryptanalysis harder, but slows cipher
• round function
• greater complexity can make analysis harder, but slows cipher
• fast software en/decryption & ease of analysis
• are more recent concerns for practical use and testing
5
Feistel Cipher Decryption
6
DES Design Controversy
DES Encryption
7
Initial Permutation IP
8
DES Round Structure
Substitution Boxes S
9
DES Key Schedule
DES Decryption
10
Avalanche Effect
11
Strength of DES – Timing Attacks
Differential Cryptanalysis
12
Differential Cryptanalysis
13
Linear Cryptanalysis
• function f:
• provides “confusion”, is nonlinear, avalanche
• key schedule
• complex subkey creation, key avalanche
14
Modes of Operation
15
Electronic Codebook Book (ECB)
16
Cipher Block Chaining (CBC)
17
Advantages and Limitations of CBC
18
Cipher FeedBack (CFB)
19
Output FeedBack (OFB)
20
Advantages and Limitations of OFB
Counter (CTR)
21
Counter (CTR)
• efficiency
• can do parallel encryptions
22
Summary
• have considered:
• block cipher design principles
• DES
• details
• strength
• Differential Cryptanalysis
• Modes of Operation
• ECB, CBC, CFB, OFB, CTR
23